Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
Hardware ID Reader.exe
Resource
win11-20231215-en
Target
Hardware ID Reader.exe
Size
2.1MB
MD5
0e00a0cc36c3048d2f8b257e938287a2
SHA1
dbaf73f27edab74f09605438e689ec1f49866fb0
SHA256
33500837ad3cf48bf5226bf6f874c6ef77c0bcc20a4bab88b1d3286c113ae676
SHA512
88f5fc1c68c31e2d7de62ce3ea2ebb4e2ce25cf51bf5b62741c0d5da9a2ef067d2f495c1293a14103167ec01387944d0488bfece753d8ea14e1eb418b4e39c4d
SSDEEP
49152:RRYgD6oymp93NHhAkbJDNnrVkfEmzt5ThqbWoOIWVmA+RVzp:jhym1TbJxrV4ztaIvgAA
resource | yara_rule |
---|---|
sample | vmprotect |
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
GetModuleFileNameA
LoadLibraryA
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
FindWindowA
CharUpperBuffW
RegQueryValueExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
WTSSendMessageW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ